The United NationsManual for the Protection of Computer Systems and Computer Softwarethas listed the following basic security measures in 1987:
However, limitations of the UN manual are that it is a human-made set of rules and thus, subject to human errors and omissions. Furthermore, since 1987, there has been little consistent effort to ratify and implement the elaborated policies.
Many of the steps identified in the manual are dependent on the user’s expertise in answering questions and verifying identity. In addition, the coverage is not comprehensive enough to protect against the wide range of potential threats that computer viruses, worms, Trojan horses, and other malware might pose.
For example, while the manual identifies three basic steps for ensuring security: Creation of passwords, ERC2/WE, and change of IP address, ERC2/WE, the corresponding steps are identified in the comprehensive set of passwords changed access policies. However, these rules cannot be implemented uniformly.
The COMPACT security protocol for the Windows platform is a commonly accepted methodology for the assessment and optimization of network security. The comprehensive set of rules for passwords and account names and the specific rules for creating user accounts and modifying system settings can be implemented in many different ways. In addition, the practices can be re-assigned to allow a user to know when he or she is receiving the final version. These features provide a relatively easy way to manage account access for different users.
The CHECK staff can be alerted via e-mail when unauthorized access is suspected. The standard response is to send the user an e-mail containing a notification to that effect, followed by a predetermined password question. The e-mail also includes a link that can allow the recipient to determine whether or not the network is secure.
Network security is a specialized function within the FTCA. Under the direction of an information security specialist, an investigation can be performed to prove the validity of any security claim. The expertise of computer security specialists plays a crucial role in protecting critical information.
Two professional computer security specialists facing the camera could look into whether or not the network is in a state of synchronization. If synchronized, information security measures would be activated, and if not, the specialist can investigate to determine why.
Another video gives the perspective of what it would be like to have a screen in front of you while using the Internet. The screen shows a list of items that appear to be very important. To the right of each item is listed another thing that is as important as the first one. As you move your mouse over one article, a little icon is displayed beside the information. The icon could be anything but a picture of a cross, a clock, or something else. It can even be “Virus: Win32/Lamin.A” if the icon designer wasn’t careful enough. If you happen to know someone who knows how to make icons, you could perhaps use their services to make the icon.
Having an icon in front of you doesn’t necessarily mean that the network is secure, but it shows that you know how to use internet security.
Perhaps astrophysics could be a good topic for a course on computer security. After all, we are dealing with concepts that are so important that we can’t even begin to discuss them without getting into serious trouble.